The ACM Computing Classification System (1998)

K.6.5 Security and Protection

  • Authentication
  • Insurance [**]
  • Invasive software (e.g., viruses, worms, Trojan horses)
  • Physical security [**]
  • Unauthorized access (e.g., hacking, phreaking)